lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 26 Apr 2011 23:15:58 +0000 (UTC)
From:	johnlinn@...cast.net
To:	alan@...rguk.ukuu.org.uk
Cc:	linux-kernel@...r.kernel.org, linux-serial@...r.kernel.org,
	michal.simek@...alogix.com, joe@...ches.com,
	grant.likely@...retlab.ca, greg@...ah.com
Subject: Re: [PATCH V3] tty/serial: add support for Xilinx PS UART

> -----Original Message-----
> From: Alan Cox [mailto:alan@...rguk.ukuu.org.uk] 
> Sent: Tuesday, April 26, 2011 1:58 PM
> To: John Linn
> Cc: linux-kernel@...r.kernel.org; linux-serial@...r.kernel.org;
> michal.simek@...alogix.com; joe@...ches.com;
> grant.likely@...retlab.ca;
> greg@...ah.com
> Subject: Re: [PATCH V3] tty/serial: add support for Xilinx PS UART
> 
> O
> > +	if (percent_err >= 3)
> > +		dev_err(port->dev, "Error too large, baud rate not
> set\n");
> 
> So in this cause baud isn't the one the user asked. Also the user can
> make it spew errors by continually generating wrong rates.
> 
> If the error is large go for the nearest you can and return it. The
> core
> tty code will do all the rest including reporting to the user they
> didn't
> get their wishes.
> 

Hi Alan,

Thanks for the input. I wrestled with this some before doing the 1st patchset.  

Prior to this, we were not checking for this error, but instead we were finding
the values with the least amount of error and then going with them.

I thought I was improving but now as I look at it further, that seems like it 
was better and I should have stuck to that method.

Thoughts?

> > +	else {
> > +		/* Set the values for the new baud rate */
> > +		xuartps_writel(brgr_val, XUARTPS_BAUDGEN_OFFSET);
> > +		xuartps_writel(brdiv_val, XUARTPS_BAUDDIV_OFFSET);
> 
> and in this it may not be exact.
> 
> I suspect this routine needs to return the actual baud rate (or maybe
> baudrate/error code)
> 
> 
> > +	/* Min baud rate = 6bps and Max Baud Rate is 10Mbps for 100Mhz
> clk */
> > +	baud = uart_get_baud_rate(port, termios, old, 0, 10000000);
> > +	xuartps_set_baud_rate(port, baud);
> > +	if (tty_termios_baud_rate(termios))
> > +		tty_termios_encode_baud_rate(termios, baud, baud);
> 
> and this should do something like
> 
> 	baud = xuartps_set_baud_rate(port baud);
> 
> > +
> > +	/*
> > +	 * Update the per-port timeout.
> > +	 */
> > +	uart_update_timeout(port, termios->c_cflag, baud);
> 
> [which would also fix this timeout!]

Maybe you were meaning that if the baud rate was not really set because of the
error this timeout would be wrong also, and if so that makes sense.

Otherwise, I didn't undestand why the timeout was broken.

Thanks,
John

> 
> Otherwise looks ready to merge
> 
> 
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ